We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38054

ptp: ocp: Limit signal/freq counts in summary output functions



Description

In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: Limit signal/freq counts in summary output functions The debugfs summary output could access uninitialized elements in the freq_in[] and signal_out[] arrays, causing NULL pointer dereferences and triggering a kernel Oops (page_fault_oops). This patch adds u8 fields (nr_freq_in, nr_signal_out) to track the number of initialized elements, with a maximum of 4 per array. The summary output functions are updated to respect these limits, preventing out-of-bounds access and ensuring safe array handling. Widen the label variables because the change confuses GCC about max length of the strings.

Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9 before 0b7d3e782027ac3b6fec56159e8e348042000aef
affected

ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9 before fcad74f894ac89790084cc2e1ec61b08220941d1
affected

ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9 before c9e455581e2ba87ee38c126e8dc49a424b9df0cf
affected

Default status
affected

6.9
affected

Any version before 6.9
unaffected

6.12.31
unaffected

6.14.9
unaffected

6.15
unaffected

References

git.kernel.org/...c/0b7d3e782027ac3b6fec56159e8e348042000aef

git.kernel.org/...c/fcad74f894ac89790084cc2e1ec61b08220941d1

git.kernel.org/...c/c9e455581e2ba87ee38c126e8dc49a424b9df0cf

cve.org (CVE-2025-38054)

nvd.nist.gov (CVE-2025-38054)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38054

Support options

Helpdesk Chat, Email, Knowledgebase